NOV 16 education Government

Learn about Cloud, Security, Ransomware and Generative AI-Powered, Cloud-Based Contact Center Solutions, featuring multiple AWS keynotes. The presentation content is designed for individuals working for Government Agencies, at the Federal, State and Local levels, plus Educational Institutions, both Higher Ed and K12. CPE credit hours are provided.

Here is typical and highly positive Angelbeat attendee feedback, this from the IT Director at a global pharmaceutical firm: “All the events that you host are always enjoyable because they are to the point, not a sales pitch and an educational, factual experience.”

Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to register to attend this webinar (hosted on Zoom), which also lets you download slides, watch on-demand videos, plus signup for future programs with one-click. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.

If you have any questions email rgerber@angelbeat.com and we will get back to you right away.

Speakers, Topics, Agenda


1:05 Andy Fernandez, Director of Product Management

Building better digital infrastructure for government: Fully-managed, fully-optimized data protection, backup, and recovery for Government Agencies.

R-Score Ransomware Recovery Readiness Assessment: Learn more about this Public-Private-Educational Initiative and why being best prepared and ready to recover in the event of a ransomware attack is so critical.


1:25 Jennie Jin, Solutions Architect and Sharyl Ninal, Solutions Architect

Amazon Connect Technology Overview plus Public Sector Case Studies: Provide superior customer and citizen service at a lower cost with an easy-to-use, AI-Powered cloud contact center. There will be case study examples for:



2:10 Mark Milinkovich, Cloud Solutions Architect, Product Marketing

Stop Tomorrow's Zero-Day Attacks, Today: The shift from phishing to zero-day and one-day vulnerability exploits have many CISO’s feeling the pressure to rethink their security posture and refresh their defense in depth investments. The current external focus on threat intelligence leaves one clear gap in the armor of end point detect and response postures - the application runtime environment, and agent-based enforcement by security compensating controls to protect it. Learn how focusing on trust intelligence and modern runtime application control enforcement of authorized application dependencies at runtime will prevent malware, ransomware, and data breaches from exploiting in milliseconds.